Corporate Investigator

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 375 Experts worldwide ranked by ideXlab platform

Michael King - One of the best experts on this subject based on the ideXlab platform.

  • what makes a successful Corporate Investigator an exploration of private Investigators attributes
    Journal of Financial Crime, 2020
    Co-Authors: Michael King
    Abstract:

    The purpose of this study is to identify the attributes – skills, education and qualifications – required to be a contemporary Corporate Investigator.,To address heretofore unexplored areas in the literature, this study used data collected from semi-structured interviews with 33 Corporate Investigators in Australia.,This paper highlights the complexities that surround Corporate investigations and identifies nine attributes critical for investigative success. The findings identify some commonalities with police–detective skills and suggest that the Corporate Investigator needs the skills of an accountant and a lawyer to complement these investigative skills.,Studies of private Investigators are rare as such; therefore, this paper fills a gap in academic literature by examining the skills necessary to conduct private investigations of Corporate and white-collar crime.

King Michael - One of the best experts on this subject based on the ideXlab platform.

  • What makes a successful Corporate Investigator: An exploration of private Investigators attributes
    'Emerald', 2020
    Co-Authors: King Michael
    Abstract:

    Purpose – The purpose of this study is to identify the attributes – skills, education and qualifications –required to be a contemporary Corporate Investigator. Design/methodology/approach – To address heretofore unexplored areas in the literature, this study used data collected from semi-structured interviews with 33 Corporate Investigators in Australia. Findings – This paper highlights the complexities that surround Corporate investigations and identifies nine attributes critical for investigative success. The findings identify some commonalities with police– detective skills and suggest that the Corporate Investigator needs the skills of an accountant and a lawyer to complement these investigative skills. Originality/value – Studies of private Investigators are rare as such; therefore, this paper fills a gap in academic literature by examining the skills necessary to conduct private investigations of Corporate and white-collar crime

Peter Stephenson - One of the best experts on this subject based on the ideXlab platform.

  • investigating computer related crime
    1999
    Co-Authors: Peter Stephenson
    Abstract:

    Forward by Michael Anderson-New Technologies, Inc., Former Special Agent IRS Preface What This Book is About Who Should Read This Book THE NATURE OF CYBER CRIME Cyber Crime as We Enter the 21st Century What is Cyber Crime? How Does Today's Cyber Crime Differ From the Hacker Exploits of Yesterday? The Reality of Information Warfare in the Corporate Environment Industrial Espionage-Hackers For Hire Public Law Enforcement's Role in Cyber Crime Investigations The Role of Private Cyber Crime Investigators and Security Consultants in Investigations The Potential Impacts of Cyber Crime Data Thieves Misinformation Denial of Service Rogue Code Attacks Viruses, Trojan Horses and Worms Logic Bombs Responding to Rogue Code Attacks Protection of Extended Mission Critical Computer Systems Surgical Strikes and Shotgun Blasts Symptoms of a Surgical Strike Masquerading Case Study: The Case of the Cyber Surgeon Symptoms of Shotgun Blasts "Up Yours"-Mailbombs Data Floods INVESTIGATING CYBER CRIME A Framework for Conducting an Investigation of a Computer Security Incident Managing Intrusions Why We Need an Investigative Framework What Should an Investigative Framework Provide? Drawbacks for the Corporate Investigator A Generalized Investigative Framework for Corporate Investigators Look for the Hidden Flaw The Human Aspects of Cyber Crime Investigation Motive, Means and Opportunity The Difference Between "Evidence" and "Proof" Look for the Logical Error Vanity Analyzing the Remnants of a Computer Security Incident What We Mean by a "Computer Security Incident" We Never Get the Call Soon Enough Cyber Forensic Analysis-Computer Crimes Involving Networks Computer Forensic Analysis-Computer Crimes at the Computer Software Forensic Analysis-Who Wrote the Code? The Limitations of System Logs The Logs May Tell the Tale-But There are No Logs Multiple Log Analysis Launching an Investigation Securing the Virtual Crime Scene Collecting and Preserving Evidence Interrogating and Interviewing Suspects and Witnesses Developing and Testing an Intrusion Hypothesis Investigating Alternative Explanations You May Never Catch the Culprit Damage Control and Containment Determining if a Crime Has Taken Place Statistically, You Probably Don't Have a Crime Believe Your Indications What Constitutes Evidence? Using Tools to Verify That a Crime Has Occurred Unix Crash Dump Analysis Recovering Data From Damaged Disks Examining Logs-Special Tools Can Help Clues From Witness Interviews Maintaining Crime Scene Integrity Until You Make a Determination Case Study: The Case of the CAD/CAM Cad Case Study: The Case of the Client-Server Handling the Crime in Progress Intrusions-The Intruder is Still On-Line Should You Trap, Shut Down or Scare Off the Intruder? Trap and Trace Techniques Legal Issues in Trap and Trace Stinging-Goat Files and Honey Pots "It Never Happened"-Cover-Ups are Common Case Study: The Case of the Innocent Intruder The Importance of Well Documented Evidence Maintaining a Chain of Custody Politically Incorrect-Understanding Why People Cover Up for a Cyber Crook Involving the Authorities Who Has Jurisdiction? What Happens When You Involve Law Enforcement Agencies? Making the Decision When an Investigation Can't Continue When and Why Should You Stop an Investigation? Legal Liability and Fiduciary Duty Political Issues PREPARING FOR CYBER CRIME Building a Corporate Cyber "SWAT Team" Why Do Organizations Need a Cyber SWAT Team? What Does a Cyber SWAT Team Do? Who Belongs on a Cyber SWAT Team? Training Investigative Teams Privacy and Computer Crime The Importance of Formal Policies Who Owns the E-mail? The Disk Belongs to the Organization, But What About the Data? The "Privacy Act"(s) Wiretap Laws USING THE FORENSIC UTILITIES Preface To This Section-How the Section is Organized Preserving Evidence-First Steps "Marking" Evidence With an MD5 Hash and M-Crypt Taking a Hard Disk Inventory with FileList Using SafeBack 2.0 To Take an Image of a Fixed Disk Searching For Hidden Information The Intelligent Filter IP Filter GetSlack GetFree SeeJunk Text Search Pro Using the Norton Utilities Handling Floppy Disks AnaDisk Copying Floppies to a Work Disk Disks Within Disks

Dawson Leigh - One of the best experts on this subject based on the ideXlab platform.

  • Students get taste of university life at Notre Dame
    ResearchOnline@ND, 2012
    Co-Authors: Dawson Leigh
    Abstract:

    Homer Simpson - a pain in the buttock; To Catch a Thief - a day in the life of a forensic Corporate Investigator; and Sports Sciences Testing – the fastest, strongest and most powerful. These were just some of the topics and fun presentations that students in years 10, 11 and 12 had the chance to attend as part of The University of Notre Dame Australia\u27s A Day in the Life of a University Student in Fremantle on Friday 20 July. Each year, Notre Dame\u27s Fremantle Campus hosts the day which attracts high school students from across Western Australia. Having the opportunity to experience a day at university is an important and unique opportunity for high school students considering tertiary studies, explains Deputy Director, Admissions and Student Services, Liz Beal. We offer them the chance to take part in lectures and interactive activities, tour the Campus, meet academic staff and have a chat to our students. This day is an ideal opportunity to gain an understanding of what the transition from high school to university studies can be like. Carine Senior High School student, Mia Lindsay, said she was keen to know more about the journalism units the University offered as her ambition is to work in the media industry as a fashion or travel writer. She said she was excited at the prospect of learning new ways that news could be recorded by journalists and received by audiences. Having attended the journalism workshop at Notre Dame, I can now see just how influential the use of mobile technology is in the daily production of news bulletins and other media publications, Mia said. The Health Sciences workshops provided a totally hands-on experience for participants. Mazenod College student, Vincent Sala-Tenna, got the chance to test his strength, stamina and \u27vertical leap\u27 when he attended the Sports Science session. He said the day provided him with an insight into a possible future career as a personal trainer. Before attending the event, I was unsure of what course or pathway I needed to take in order to have career in the sports industry, Vincent said. It was great to know that Notre Dame has several options available for students wanting to pursue a future in Health Sciences. Overall, I really enjoyed participating in the event and learning about life as a university student. Want to know more about life as a Notre Dame student? Then join the Notre Dame community at the 2012 Open Day Festival on Sunday 19 August from 10am. There will be plenty of interactive workshops for prospective students and loads of live entertainment for the family. For more information, please contact the Prospective Students Office on (08) 9433 0533 or email future@nd.edu.au. MEDIA CONTACT: Michelle Ebbs: Tel (08) 9433 0610; Mob 0408 959 138 Leigh Dawson: Tel (08) 9433 0569; Mob 0405 441 09